Analysis
-
max time kernel
1s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-02-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll
-
Size
82KB
-
MD5
38739e8c8fc39b3ef8c25b996e4bfa74
-
SHA1
d0792a6b36960254216de3217887c914df633de1
-
SHA256
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784
-
SHA512
cad0deafcb65e39e96bb0eeb50833dc56fcc4600348950c438c23f6504470c56f1098381f1202992cce3efcc989c5091574f634166460e2783c3d9201010ce3d
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1392 2080 rundll32.exe 82 PID 2080 wrote to memory of 1392 2080 rundll32.exe 82 PID 2080 wrote to memory of 1392 2080 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll,#12⤵PID:1392
-